Bug 698462 - RFE: Retain bugzilla/cve/etc information for future review. [NEEDINFO]
Summary: RFE: Retain bugzilla/cve/etc information for future review.
Keywords:
Status: CLOSED WONTFIX
Alias: None
Product: Fedora
Classification: Fedora
Component: gnome-packagekit
Version: rawhide
Hardware: Unspecified
OS: Unspecified
unspecified
low
Target Milestone: ---
Assignee: Richard Hughes
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2011-04-20 22:25 UTC by Joel Davis
Modified: 2015-05-28 20:29 UTC (History)
9 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2015-05-28 20:29:25 UTC
Type: ---
james.antill: needinfo? (notting)


Attachments (Terms of Use)

Description Joel Davis 2011-04-20 22:25:49 UTC
Description of problem:
Currently GPK shows you information about the CVE's etc that are related to an update. I think it would be helpful to hold onto this information in a graphical tools so that you can see if any packages associated with a particular bugzilla or whatever so you can see if a given issue was relevant for your system. Base installs could probably include CVE/bugzillas issues resolved during the update process of the last cycle (for example if the problem presented in a F14 version of the package but you're in F15) which is helpful if you're concerned with whether or not an issue still exists in F15 but you didn't/can't test the latest F14 system.

I'd try to create at least a proof of concept, but I'm completely unfamiliar with the underlying system.

Hopefully that's not too wish-fulfillment,
- Joel

Comment 1 Bill Nottingham 2011-04-25 18:33:09 UTC
Perhaps some combination of the yum history and yumdb could be exported to do this?

Comment 2 James Antill 2011-04-26 15:17:28 UTC
 There's no need to save it anywhere, the BZ/CVE/etc. information is always there via. updateinfo. So Eg. on F13 I can do:


% sudo yum updateinfo list security all perl-suidperl
Loaded plugins: PT, aliases, auto-update-debuginfo, keys, noop, ps, security,
              : tmprepo, updater, verify, versionlock
i FEDORA-2010-11323 security perl-suidperl-5.10.1-116.fc13.x86_64
  FEDORA-2011-4918  security perl-suidperl-4:5.10.1-123.fc13.x86_64
updateinfo list done

...which says that both the above security errata applied to my system, and the first one is installed.

 I don't think there's a specific cmd line view that matches what the OP wanted (unless "updateino info security all" is good), but the information is there.

Comment 3 Richard Hughes 2011-04-26 15:38:13 UTC
What would the UI look like?

Comment 4 Bill Nottingham 2011-04-26 18:51:12 UTC
Actually, re: comment #2 - if this is only querying the current update info, that means I can't see if a particular CVE on my F-15 system was fixed by an update back when it was running F-14, correct?

Comment 5 Joel Davis 2011-04-26 21:23:30 UTC
Could the "CVE Digest" (so to speak) be incorporated in the yumdb of fedora-release? The GUI version might just query current updates and then fall back to fedora-release to see if the CVE was resolved in a previous version cycle. If they're looking for something older than a cycle and a half they probably should be looking at the bugzilla.

BTW, it appears that sloppy editing and/or minor stroke mucked up the first comment, sorry about that.

Comment 6 Joel Davis 2011-04-26 21:38:14 UTC
as far as the UI I had in mind, I pictured just a simple query box with a list of results an the information listed on the right sort of like:

http://www.linuxscrew.com/wp-content/uploads/2007/11/gnochm-large.png

Without the menu obviously.

Comment 7 James Antill 2011-04-27 04:58:39 UTC
Re: comment #4 ... well there's --releasever ... and it seems dubious how much you want to know about what happened on F14, when you've moved to F15 (it's slightly different when you've on pre-F15, maybe -- but then a good summary might be "your system is slightly buggy" :).

Do you have any stats. on how often a particular errata is updated, and with what?

As I guess if they tend to not get changed etc. ... there's little harm in storing them for installed packages (or maybe even storing bzs/cves in the history).

Comment 8 Joel Davis 2011-04-27 19:57:38 UTC
I know you weren't replying to me, but my thinking with incorporating F14 CVE's/bugs in F15 was to have local visibility as to whether an issue affects the current system. If a CVE comes out and is addressed towards the end of F14, I don't think you should lose visibility of that. Obviously issues that came out release before previous are old enough for people to logically deduce that the CVE isn't an issue for them.

Comment 10 Matthias Clasen 2015-05-28 20:29:25 UTC
We're not adding new features to gpk-update-viewer at this point.


Note You need to log in before you can comment on or make changes to this bug.